Attacks on digital audio watermarks and countermeasures

We present a classification of attacks against digital audio watermarks and possible countermeasures. We present the categorization of attacks into the four different groups of removal, desynchronization, embedding and detection attacks. The logic behind this arrangement is based on the effect the attack should produce during the detection of the audio watermark and is discussed in detail. For each class of attacks an exhaustive explanation is provided with corresponding links to other media types. If countermeasures are known for the attacks they are described in each group.

[1]  Boon-Lock Yeo,et al.  Technical trials and legal tribulations , 1998, CACM.

[2]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[3]  Min Wu,et al.  Reading Between the Lines: Lessons from the SDMI Challenge , 2001, USENIX Security Symposium.

[4]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[5]  Adrian Perrig,et al.  A Copyright Protection Environment for Digital Images , 1997, Verläßliche IT-Systeme.

[6]  Mohamed F. Mansour,et al.  Secure watermark detection with nonparametric decision boundaries , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[7]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[8]  Darko Kirovski,et al.  The blind pattern matching attack on watermark systems , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[9]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[10]  Bernd Girod,et al.  Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[11]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[12]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[13]  Stephen D. Wolthusen,et al.  Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.

[14]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[15]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[16]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[17]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[18]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..